The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An approach to class diagram design is suggested in this paper. The approach is based on the analysis of behavioral software models represented by collaboration diagrams. An analytical form of collaboration diagrams representation is suggested. Rules that define relations between class diagram constituents by analyzing the analytical representation of collaboration diagrams are presented. An approach...
The documentation of architectural knowledge helps to understand and prevent the violation of previous decisions. Documenting the architectural knowledge of product lines is more complex than in the case of single-product architectures because it requires considering the existing variability in a product family. This implies having the capability to describe design decisions and relationships related...
Safety analysis is increasingly important for a wide class of systems. In the automotive field, the recent ISO26262 standard foresees safety analysis to be performed at system, hardware, and software levels. Failure Modes and Effects Analysis (FMEA) is an important step in any safety analysis process, and its application at hardware and system levels has been extensively addressed in the literature...
Software architecture reflects important decisions on structure, used technology and resources. Architecture decisions influence to a large extent requirements on software quality. During software evolution change requests have to be implemented in a way that the software maintains its quality, as various potential implementations of a specific change request influence the quality properties differently...
Based on the management system of university laboratory project application in ZJUT, this article studies the technical principle and core things deeply so as to know the actual effect of web application developed by WebWork framework and extended functions by jFinal framework. At the same time, a MVFO model which is suitable for this project is provided according to the insight of MVC and specifically...
A Distributed Denial of Service (DDoS) attack can inflict a grave toll on revenues. Developing countries like Nepal where the E-government system services are in infancy state; if attack like DDoS occurs the probability of dying out of system itself is more. Citizens may be reluctant in using E-services. To handle such challenges, this paper compares various security architectures for E-government...
This article presents a method to describe system requirements with B abstract machine, and transformation rules from B method to the Architecture Analysis and Design Language (AADL) model. We aim at solving the problems of requirements non-deterministic and ensuring requirements consistency during conversion procedure, AADL architecture model is consistent with requirements. Furthermore, in the early...
This paper proposes a model-based software safety analysis method for flight control software. Firstly, the AADL architecture model and error model of flight control software are constructed separately. Then we convert the AADL model of flight control software into extended Markov chain model. We can evaluate safety of software component by calculate the probability of component state in different...
Recently, traffic analysis and measurements have been used to characterize, from a security point of view, applications' and network behavior to avoid intrusion attempts, malware injections and data theft. Since most of the generated data traffic is from the embedded mobile devices, the analysis techniques have to cope on the one hand with the scarce computing capabilities and battery limitation of...
In general, the definition of a cyclic scheduling of tasks in safety critical systems is a time-consuming activity. The analysis of scheduling can be seen as the interplay of frequent changes of software specifications and considerations of mathematical models of optimization. An approach that combines the elaboration of mathematical models and take into account the ever-changing software specifications...
This paper develops an experimental and Evaluation system which accelerates the construction of experimental scheme. At the same time, it helps with the creation of experiment samples and evaluation of the impact of experiment variable attributes. Based on the analysis of the procedure of experimental design, four main components of the system are set up: experiment project editor, experiment sample...
In this paper we analyze the structuring principles underlying Service-oriented Enterprise Architecture (SoEA) in the light of a core reference ontology for services (UFO-S). The ontology provides a broad account for services and is centered on the service commitments/claims that are established by service participants throughout the service lifecycle. UFO-S is applied as theory to support the analysis...
An architectural style is characterized by their control-flow and data-flow patterns, appropriation of functionality across components, connectors, ports, and roles. Selecting an architectural style for an application is not an easy task. It is a decision-making task in which different objectives must be taken into consideration. In this study, different architectural styles are classified on the...
In a software development life cycle, system requirement management is an important but neglected step. A good requirement management can not only help developers to meet the requirements of the system, but also play an essential role for the communication among the stakeholders. Usually, natural language is used to describe and record the user requirements, yet it tends toward the situation of ambiguity,...
Requirement change management is an important activity in software development. When we change our requirements it affects the other requirements of the system as well as the architecture of the system. It needs a proper approach which improves the requirement change management and its impact on architecture in a better way. In this paper a framework has been introduced which integrates the impact...
According to the fact that the decision-making of surface vessels is more and more complicated, based on the military process of decision-making of surface vessels, using soft engineering, from the view of system science, this article expounds the complexity of the command architecture and decision-making of surface vessels, then analyzes the process of consultation decision, at last, it establishes...
Specifying and modeling Quality of Service (QoS) properties represents a key challenge for cyber physical system development. Quality of Service (QoS) is a general term that specifies system quality and performance, as opposed to system functionality of cyber physical systems. QoS specification is concerned with capturing application level QoS requirements and management policies of cyber physical...
Architecture Description Languages (ADLs) support modeling and analysis of systems through models transformation and exploration. Various contributions made proposals to bring verification capabilities to designers through model-based frame-works and illustrated benefits to the overall system quality. Model-level analyses are usually performed as an exogenous, unidirectional and semantically weak...
Prototyping distributed embedded system can be seen as a collection of many requirements covering many domains. System designers and developers need to describe both functional and non-functional requirements. Building distributed systems is a very tedious task since the application has to be verifiable and analyzable. Architecture Analysis and Design Language (AADL) provides adequate syntax and semantics...
Advanced asset health management solutions blend business intelligence with analytics that incorporate expert operational knowledge of industrial equipment and systems. Key challenges in developing these solutions include: streamlining the capture and prepackaging of operational experts' knowledge as analytic modules, efficiently evolving the modules as knowledge grows, adapting the analytics in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.